| Literature DB >> 34336174 |
Saeed Ullah Jan1, Sikandar Ali2,3, Irshad Ahmed Abbasi4, Mogeeb A A Mosleh5, Ahmed Alsanad6, Hizbullah Khattak7.
Abstract
Biosensor is a means to transmit some physical phenomena, like body temperature, pulse, respiratory rate, electroencephalogram (EEG), electrocardiogram (ECG), and blood pressure. Such transmission is performed via Wireless Medical Sensor Network (WMSN) while diagnosing patients remotely through Internet-of-Medical-Things (IoMT). The sensitive data transmitted through WMSN from IoMT over an insecure channel is vulnerable to several threats and needs proper attention to be secured from adversaries. In contrast to addressing the security of all associated entities involving patient monitoring in the healthcare system or ensuring the integrity, authorization, and nonrepudiation of information over the communication line, no one can guarantee its security without a robust authentication protocol. Therefore, we have proposed a lightweight and robust authentication scheme for the network-enabled healthcare devices (IoMT) that mitigate all the identified weaknesses posed in the recent literature. The proposed protocol's security has been analyzed formally using BAN logic and ProVerif2.02 and informally using pragmatic illustration. Simultaneously, at the end of the paper, the performance analysis result shows a delicate balance of security with performance that is often missing in the current protocols.Entities:
Mesh:
Year: 2021 PMID: 34336174 PMCID: PMC8324348 DOI: 10.1155/2021/9954089
Source DB: PubMed Journal: J Healthc Eng ISSN: 2040-2295 Impact factor: 2.682
Figure 1Network model.
Figure 2Working procedure of the proposed system.
Comprehensive literature review.
| Reference | Technique used | Main contribution | Limitation | |
|---|---|---|---|---|
| [ | Klonoff | Certificate-based datagram transport layer security (DTLS) | The proposed scheme consists of a secure and efficient end-user authentication and authorization architecture based on the certificate based DTLS handshake, secure end-to-end communication based on session resumption, and full mobility based on interconnected gateways | The authentication is performed in several steps, due to which multiple round trips can degrade the performance of the process. Also, the securities of the said architecture can easily be breached by an attacker |
|
| ||||
| [ | Borthakur et al. | Access-control determination (ACD) algorithm | This work proposes a fine-grained access control mechanism suitable for various implementation scenarios, including data storage, directories, and file management | The execution time length is associated with the number of the input task. Therefore the performance will be degraded by increasing the number of input tasks |
|
| ||||
| [ | Dastjerdi and Buyya | BLE bonding process | This paper addressed some of the fundamental problems. In designing, implementing, and deploying an end-to-end healthcare application that leverages the advantages of the fog computing approach | If the number of corresponding ECG devices increases, more storage will be required, and throughput will be reduced |
|
| ||||
| [ | Engineer et al. | Contextual-based access control (CBAC) technique and role-based access control (RBAC) | The paper suggested service-oriented security architecture in the IoT environment for remote medical services. The proposed framework accommodates dynamic security elements and requirements regarding different kinds of users | The proposed framework reduces sensitive information exposure by applying a security channel and encryption during the transmission of sensitive information between network parts |
|
| ||||
| [ | Sanaz et al. | Lightweight anonymous authentication protocol | A secure IoT-based healthcare system was proposed using BSN, called BSN-Care, which can efficiently accomplish various security requirements of the BSN-based healthcare | The proposed work can have stolen verifier attack, replay attack, and anonymity issue |
|
| ||||
| [ | Wang et al. | Machine learning/deep learning | This paper introduces a novel ECG-based biometric authentication approach that utilizes legendre polynomial extraction and MLP classifier for identification and authorization | Lack of standardization, not accommodate changes to the biometric overtime, sample collection phase is influenced by environmental and mental conditions |
|
| ||||
| [ | Akrivopoulos et al. | Physical unclonable functions (PUFs) | This paper presents a PUF based device authentication protocol capable of authenticating devices without demanding high CPU power from the end devices | No information about the end device is directly stored on the server, requiring an extra layer of security |
Notations and its descriptions.
| Symbol | Description |
|---|---|
|
| Medical professional |
| SN | Sensor node |
| ID | User's identity |
|
| Gateway secret key |
|
| Random numbers |
| || | Concatenation function |
| GW | Gateway node |
| PW | User's password |
| ID | Sensor nodes identity |
| TID | Temporary-identity generated by GW for |
|
| Collision-free hash-operation |
| ⊕ | Bitwise XOR operation |
Figure 3Medical professional registration phase
Figure 4Key agreement phase
Figure 5General framework.
Figure 6Password change phase
Algorithm 1Algorithmic representation of the proposed protocol.
Attacks and functionalities comparison.
| Attack description | [ | [ | [ | [ | Our |
|---|---|---|---|---|---|
| Replay attack | ✓ | ✓ | ✖ | ✖ | ✖ |
| Masquerade attack | ✓ | ✖ | ✓ | ✓ | ✖ |
| Privileged insider attack | ✖ | ✖ | ✖ | ✓ | ✖ |
| Man-in-middle attack | ✓ | ✖ | ✓ | ✖ | ✖ |
| Malicious attack | ✓ | ✓ | ✓ | ✖ | ✖ |
| Anonymity violation | ✖ | ✓ | ✓ | ✓ | ✖ |
| Mutual authentication | ✓ | ✖ | ✓ | ✓ | ✓ |
| DoS attack | ✖ | ✓ | ✖ | ✓ | ✖ |
| Offline guessing attack | ✓ | ✓ | ✖ | ✓ | ✖ |
| Impersonation attack | ✓ | ✖ | ✓ | ✖ | ✖ |
| Spoofing attack | ✖ | ✓ | ✖ | ✓ | ✖ |
| Sensor capture attack | ✖ | ✖ | ✖ | ✖ | ✖ |
Storage overhead analysis and comparison.
| Protocol | Storage overheads in bits |
|---|---|
| Kumari et al. [ | 2976 |
| Rathore et al. [ | 3978 |
| Wu et al. [ | 3968 |
| Amin et al. [ | 2112 |
| Our | 2088 |
Figure 7Storage overheads in bits.
Computation cost analysis and comparison.
| Protocol | [ | [ | [ | Our |
|---|---|---|---|---|
| Phase↓ | ||||
| Registration | 4 | 3 | 5 | 3 |
| Login and authentication | 10 | 19 | 35 | 34 |
Figure 8Computation cost comparison.